首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   103057篇
  免费   12615篇
  国内免费   8294篇
电工技术   10185篇
技术理论   2篇
综合类   9544篇
化学工业   12894篇
金属工艺   6413篇
机械仪表   7199篇
建筑科学   8081篇
矿业工程   3997篇
能源动力   2924篇
轻工业   10153篇
水利工程   3205篇
石油天然气   4147篇
武器工业   1422篇
无线电   12251篇
一般工业技术   9401篇
冶金工业   4018篇
原子能技术   1782篇
自动化技术   16348篇
  2024年   641篇
  2023年   1846篇
  2022年   3985篇
  2021年   5551篇
  2020年   3905篇
  2019年   2823篇
  2018年   3091篇
  2017年   3579篇
  2016年   3213篇
  2015年   4944篇
  2014年   5989篇
  2013年   7123篇
  2012年   8681篇
  2011年   8845篇
  2010年   8336篇
  2009年   8070篇
  2008年   7893篇
  2007年   7717篇
  2006年   6591篇
  2005年   5297篇
  2004年   3852篇
  2003年   2686篇
  2002年   2486篇
  2001年   2154篇
  2000年   1721篇
  1999年   844篇
  1998年   415篇
  1997年   313篇
  1996年   265篇
  1995年   235篇
  1994年   165篇
  1993年   105篇
  1992年   108篇
  1991年   74篇
  1990年   60篇
  1989年   52篇
  1988年   29篇
  1987年   21篇
  1986年   30篇
  1985年   12篇
  1984年   26篇
  1983年   9篇
  1982年   12篇
  1981年   17篇
  1980年   35篇
  1979年   22篇
  1977年   9篇
  1976年   18篇
  1959年   19篇
  1951年   17篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
今日头条的服务器每天都会产生规模庞大的训练数据,为方便进行训练,这些数据都具有特定的格式和分布特征。使用不同类型的通用压缩算法(字典类型及非字典类型)进行测试,发现单独任何一种算法都无法在满足业务需求(速率需求和CPU占比等)的同时获得较为可观的压缩比。针对今日头条的训练数据,提出了分段聚类压缩和Hash recoding压缩两种策略。实验结果表明,分段聚类压缩方式在更好地保证了压缩率的同时提高了压缩速率的目的;Hash recoding压缩方式则更好地达到了以少量压缩速率的损失换取更可观的压缩率的目的。分段聚类方式搭配Gzip压缩算法的组合能使压缩速率提高300%以上;Hash recoding方式匹配Snappy压缩算法能使压缩率缩小50%以上。根据实际需求,不论选择哪种策略,对于降低今日头条的运营成本,提升业务处理的效率,提供更好的用户体验,都有一定意义。  相似文献   
122.
The performance of speech recognition in distant-talking environments is severely degraded by the reverberation that can occur in enclosed spaces (e.g., meeting rooms). To mitigate this degradation, dereverberation techniques such as network structure-based denoising autoencoders and multi-step linear prediction are used to improve the recognition accuracy of reverberant speech. Regardless of the reverberant conditions, a novel discriminative bottleneck feature extraction approach has been demonstrated to be effective for speech recognition under a range of conditions. As bottleneck feature extraction is not primarily designed for dereverberation, we are interested in whether it can compensate for other carefully designed dereverberation approaches. In this paper, we propose three schemes covering both front-end processing (cascaded combination and parallel combination) and back-end processing (system combination). Each of these schemes integrates bottleneck feature extraction with dereverberation. The effectiveness of these schemes is evaluated via a series of experiments using the REVERB challenge dataset.  相似文献   
123.
124.
This paper proposes a deep bidirectional long short-term memory approach in modeling the long contextual, nonlinear mapping between audio and visual streams for video-realistic talking head. In training stage, an audio-visual stereo database is firstly recorded as a subject talking to a camera. The audio streams are converted into acoustic feature, i.e. Mel-Frequency Cepstrum Coefficients (MFCCs), and their textual labels are also extracted. The visual streams, in particular, the lower face region, are compactly represented by active appearance model (AAM) parameters by which the shape and texture variations can be jointly modeled. Given pairs of the audio and visual parameter sequence, a DBLSTM model is trained to learn the sequence mapping from audio to visual space. For any unseen speech audio, whether it is original recorded or synthesized by text-to-speech (TTS), the trained DBLSTM model can predict a convincing AAM parameter trajectory for the lower face animation. To further improve the realism of the proposed talking head, the trajectory tiling method is adopted to use the DBLSTM predicted AAM trajectory as a guide to select a smooth real sample image sequence from the recorded database. We then stitch the selected lower face image sequence back to a background face video of the same subject, resulting in a video-realistic talking head. Experimental results show that the proposed DBLSTM approach outperforms the existing HMM-based approach in both objective and subjective evaluations.  相似文献   
125.
We focus on practical Hierarchical Identity-Based Broadcast Encryption (HIBBE) with semantic security against adaptively chosen-ciphertext attacks (CCA2) in the standard model. We achieve this goal in two steps. First, we propose a new HIBBE scheme that is secure against chosen-plaintext attacks (CPA). Compared with the existing HIBBE scheme that is built from composite-order bilinear groups, our construction is based on prime-order bilinear groups. The much better efficiency of group operations in prime-order bilinear groups makes our proposed HIBBE scheme more practical. Then, we convert it into a CCA2-secure scheme at the cost of a one-time signature. Instead of extending one user hierarchy in the Canetti–Halevi–Katz approach from CPA-secure (\(l+1\))-Hierarchical Identity-Based Encryption [(\(l+1\))-HIBE] to CCA2-secure \(l\)-HIBE, our construction merely adds one on-the-fly dummy user in the basic scheme. We formally prove the security of these two schemes in the standard model. Comprehensive theoretical analyses and experimental results demonstrate that the proposed HIBBE schemes achieve desirable performance.  相似文献   
126.
127.
Internet of Things (IoT) connects billions of devices in an Internet-like structure. Each device encapsulated as a real-world service which provides functionality and exchanges information with other devices. This large-scale information exchange results in new interactions between things and people. Unlike traditional web services, internet of services is highly dynamic and continuously changing due to constant degrade, vanish and possibly reappear of the devices, this opens a new challenge in the process of resource discovery and selection. In response to increasing numbers of services in the discovery and selection process, there is a corresponding increase in number of service consumers and consequent diversity of quality of service (QoS) available. Increase in both sides’ leads to the diversity in the demand and supply of services, which would result in the partial match of the requirements and offers. This paper proposed an IoT service ranking and selection algorithm by considering multiple QoS requirements and allowing partially matched services to be counted as a candidate for the selection process. One of the applications of IoT sensory data that attracts many researchers is transportation especially emergency and accident services which is used as a case study in this paper. Experimental results from real-world services showed that the proposed method achieved significant improvement in the accuracy and performance in the selection process.  相似文献   
128.
本文通过对螺栓定力断裂机理进行分析及计算,分别从失效形式及断裂源找出导致螺栓断裂的原因,并对影响预紧力的因素逐一分析,得出预紧力与摩擦系数的关系,对为各类螺栓定力做好技术储备,并提出防范措施。  相似文献   
129.
针对胃上皮肿瘤细胞图像(以下简称肿瘤细胞图像)黏结严重和信息冗余的特点,提出了一种将自适应观测矩阵的压缩感知(SAM-CS)和自组织特征映射(SOFM)神经网络相结合的算法。该算法将肿瘤细胞图像拉成列向量,然后利用通过自适应过程产生的观测矩阵,基于压缩感知理论对图像信息进行观测,产生线性观测向量,最后利用SOFM神经网络的学习算法对观测向量进行训练和分类,实现对肿瘤细胞图像的识别。实验表明,相比常用算法,该算法至少提高了4.2%的识别准确率和5.7%的运算速度。  相似文献   
130.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号